Baojiang Cui
Orcid: 0000-0001-6937-4068
According to our database1,
Baojiang Cui
authored at least 170 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Cybersecur., December, 2024
Cybersecur., December, 2024
KimeraPAD: A Novel Low-Overhead Real-Time Defense Against Website Fingerprinting Attacks Based on Deep Reinforcement Learning.
IEEE Trans. Netw. Serv. Manag., June, 2024
IEEE Trans. Consumer Electron., February, 2024
A formal security analysis of the fast authentication procedure based on the security context in 5G networks.
Soft Comput., February, 2024
J. Circuits Syst. Comput., February, 2024
RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm.
IEEE Trans. Inf. Forensics Secur., 2024
A Smart Contract Vulnerability Detection System Based on BERT Model and Fuzz Testing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
A PFCP Protocol Fuzz Testing Framework Integrating Data Mutation Strategies and State Transition Algorithms.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
An Efficient Vulnerability Detection Method for 5G NAS Protocol Based on Combinatorial Testing.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Binary Firmware Static Vulnerability Mining Based on Semantic Attributes and Graph Embedding Network.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Source Code Vulnerability Detection Based on Graph Structure Representation and Attention Mechanisms.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Research and Implementation of TFTP Encrypted Traffic Analysis and Attack Technology Based on 4G Man-in-the-Middle.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Rev Gadget: A Java Deserialization Gadget Chains Discover Tool Based on Reverse Semantics and Taint Analysis.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
An Efficient Cross-Contract Vulnerability Detection Model Integrating Machine Learning and Fuzz Testing.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
XRLFuzz: Fuzzing Binaries Guided by Format Information Based on Deep Reinforcement Learning.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
Real-Time Detection of Network Exploration Behavior: A Method Based on Feature Extraction and Half-Space Trees Algorithm.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
4G Access Network Protection and Compliance Detection Based on Man-in-the-Middle Model.
Proceedings of the Advances in Internet, Data & Web Technologies, 2024
2023
Deep neural network pruning method based on sensitive layers and reinforcement learning.
Artif. Intell. Rev., November, 2023
Proc. Priv. Enhancing Technol., April, 2023
IEEE Trans. Inf. Forensics Secur., 2023
On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks.
Sensors, 2023
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network.
Comput. Commun., 2023
IPT-CFI: Control Flow Integrity Vulnerability Detection Based on Intel Processor Trace.
Proceedings of the Advances in Internet, Data & Web Technologies, 2023
Proceedings of the Advances in Internet, Data & Web Technologies, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE/ACM Trans. Netw., 2022
Comput. Secur., 2022
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022
Proceedings of the 2nd International Conference on Control and Intelligent Robotics, 2022
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
2021
World Wide Web, 2021
A Method of Information Protection for Collaborative Deep Learning under GAN Model Attack.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021
An Improved Feature Extraction Approach for Web Anomaly Detection Based on Semantic Structure.
Secur. Commun. Networks, 2021
A novel model for anomaly detection in network traffic based on kernel support vector machine.
Comput. Secur., 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
A High Efficiency and Accuracy Method for x86 Undocumented Instruction Detection and Classification.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Malicious Encrypted Traffic Identification Based on Four-Tuple Feature and Deep Learning.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Fuzzing Method Based on Selection Mutation of Partition Weight Table for 5G Core Network NGAP Protocol.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2021
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021
A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2021
2020
Trustworthy Network Anomaly Detection Based on an Adaptive Learning Rate and Momentum in IIoT.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
Future Gener. Comput. Syst., 2020
HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations.
Future Gener. Comput. Syst., 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Research on IoT Device Vulnerability Mining Technology Based on Static Preprocessing and Coloring Analysis.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
A Targeted Fuzzing Technique Based on Neural Networks and Particle Swarm Optimization.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
The Study and Realization of a Binary-Based Address Sanitizer Based on Code Injection.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Research on Association Analysis Technology of Network Attack Trace Based on Web Log.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2020
Proceedings of the Advanced Information Networking and Applications, 2020
2019
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019
Serv. Oriented Comput. Appl., 2019
Internet Things, 2019
Detecting Malicious URLs via a Keyword-Based Convolutional Gated-Recurrent-Unit Neural Network.
IEEE Access, 2019
Proceedings of the Space Information Networks - 4th International Conference, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2019
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Proceedings of the Advances in Internet, 2019
Terminal Access Data Anomaly Detection Based on GBDT for Power User Electric Energy Data Acquisition System.
Proceedings of the Advances in Internet, 2019
Terminal Access Data Anomaly Detection Based on Random Forest for Power User Electric Energy Data Acquisition System.
Proceedings of the Advanced Information Networking and Applications, 2019
2018
J. Netw. Comput. Appl., 2018
Int. J. Web Grid Serv., 2018
Int. J. High Perform. Comput. Netw., 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
The Study and Realization of Vulnerability-Oriented Fuzzing Technology for ActiveX Plug-Ins.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
Malware Detection Using Machine Learning Based on the Combination of Dynamic and Static Features.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the Advances in Internet, 2018
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Soft Comput., 2017
Int. J. Web Grid Serv., 2017
Int. J. Web Grid Serv., 2017
Uploading multiply deferrable big data to the cloud platform using cost-effective online algorithms.
Future Gener. Comput. Syst., 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
The Study and Realization of Browser Defect Detection Technology Based on Intelligent Boundary Reverse.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
A Malware Detection Method Based on Sandbox, Binary Instrumentation and Multidimensional Feature Extraction.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on Broad-Band Wireless Computing, 2017
Proceedings of the Advances on P2P, 2017
2016
IEEE Trans. Computers, 2016
Soft Comput., 2016
Int. J. Ad Hoc Ubiquitous Comput., 2016
Design and analysis of secure mechanisms based on tripartite credibility for RFID systems.
Comput. Stand. Interfaces, 2016
Design and Implementation of a C++ Memory Leak Detection Tool Based on Dynamic Instrumentation.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
The Performance Optimization of Hadoop during Mining Online Education Packets for Malware Detection.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016
Design and implementation of software consistency detection system based on Netty framework.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
A program behavior recognition algorithm based on assembly instruction sequence similarity.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
Bidirectional Analysis Method of Static XSS Defect Detection Technique Based On Database Query Language.
Trans. Comput. Collect. Intell., 2015
Pervasive Mob. Comput., 2015
Mob. Inf. Syst., 2015
J. Ambient Intell. Humaniz. Comput., 2015
A practical off-line taint analysis framework and its application in reverse engineering of file format.
Comput. Secur., 2015
Research on the Performance of Mining Packets of Educational Network for Malware Detection between PM and VM.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Research on the Collaborative Analysis Technology for Source Code and Binary Executable Based upon the Unified Defect Mode Set.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
A Dynamic Self-Adaptive Algorithm for Uploading Deferrable Big Data to the Cloud Cost-Effectively.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
A New Program Classification Method Based on Binary Instrumentation and Instruction Flow Feature Extraction.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 10th International Conference on P2P, 2015
Uploading Deferrable Big Data to the Cloud by Improved Dynamic Self-Adaption Algorithm.
Proceedings of the 10th International Conference on P2P, 2015
2014
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
An Enhancement for Key Management in LTE/SAE X2 Handover Based on Ciphering Key Parameters.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Reverse Analysis Method of Static XSS Defect Detection Technique Based on Database Query Language.
Proceedings of the 2014 Ninth International Conference on P2P, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
Int. J. Grid Util. Comput., 2013
Int. J. Comput. Intell. Syst., 2013
Improving Association Rules by Optimizing Discretization Based on a Hybrid GA: A Case Study of Data from Forest Ecology Stations in China.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the Eighth International Conference on P2P, 2013
2012
Int. J. Distributed Sens. Networks, 2012
2011
Code Syntax-Comparison Algorithm Based on Type-Redefinition-Preprocessing and Rehash Classification.
J. Multim., 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010
2004
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004